scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Synthetic Biometrics: A Survey

30 Oct 2006-pp 676-683
TL;DR: This brief survey addresses the state-of-the-art techniques of inverse biometrics, which deals with synthesis of biometric data, and reports on genesis of synthetic biometric, advanced methods, and open application-specific problems.
Abstract: This brief survey addresses the state-of-the-art techniques of inverse biometrics, which deals with synthesis of biometric data. It reports on genesis of synthetic biometric, advanced methods, and open application-specific problems. Currently deployed biometric systems use comprehensive methods and algorithms (such as pattern recognition, decision making, database searching, etc.) to analyze biometric data collected from individuals. We consider the inverse task, synthesis of artificial biometric data. These biologically meaningful data are useful, for example, for testing the biometric tools, and for enhancing the security of biometric systems. The synthetic data replicate all possible instances of otherwise unavailable data, thus, creating a variety of samples for testing. Properly created artificial biometric data provides a basis for enhancing security through the detailed and controlled modeling of a wide range of training skills, strategies and tactics of a hypothetical robber or forger. Databases of synthetic biometric data also serve for simulation in forensic systems.
Citations
More filters
01 Jan 1992
TL;DR: In this paper, the Voronoi diagram generalizations of the Voroni diagram algorithm for computing poisson Voroni diagrams are defined and basic properties of the generalization of Voroni's algorithm are discussed.
Abstract: Definitions and basic properties of the Voronoi diagram generalizations of the Voronoi diagram algorithms for computing Voronoi diagrams poisson Voronoi diagrams spatial interpolation models of spatial processes point pattern analysis locational optimization through Voronoi diagrams.

133 citations

Journal ArticleDOI
01 Mar 2011
TL;DR: A new identification system has been proposed, which uses features of classes time interval, amplitude and angle from clinically dominant fiducials on each heartbeat of the electrocardiogram (ECG) and makes the decision on the identity of an individual with respect to a given database.
Abstract: This paper proposes new techniques to delineate P and T waves efficiently from heartbeats. The delineation results have been found to be optimum and stable in comparison to other published results. These delineators are used along with QRS complex to extract various features of classes time interval, amplitude and angle from clinically dominant fiducials on each heartbeat of the electrocardiogram (ECG). A new identification system has been proposed in this study, which uses these features and makes the decision on the identity of an individual with respect to a given database. The system has been tested against a set of 250 ECG recordings prepared from 50 individuals of Physionet. The matching decisions are made on the basis of correlation between heartbeat features among individuals. The proposed system has achieved an equal error rate of less than 1.01 with an accuracy of 99%.

46 citations


Cites methods from "Synthetic Biometrics: A Survey"

  • ...used in some cases to identify the individuals even after their death ( Yanushkevich 2006 )....

    [...]

Journal Article
TL;DR: This paper aims to briefly address the psychological biometric authentication techniques and a brief summary to the advantages, disadvantages and future developments of each method is provided.
Abstract: With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing user’s private data. Human biometric characteristics such as face, finger, iris scanning ,voice, signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters’ attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages, disadvantages and future developments of each method is provided in this paper.

41 citations


Cites background from "Synthetic Biometrics: A Survey"

  • ...Automatic identification/verification of an individuals’ identity based on the analysis of his/her biological (biometric) traits is broadly known as biometrics technology [1]....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features, which can be significant in attaining reduced error rates.
Abstract: One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%.

38 citations

Proceedings ArticleDOI
20 Oct 2010
TL;DR: The uses of caricature in variety of applications, theories and rules in the art of drawing caricature, how these theories are simulated in the development of caricature generation system and the current research trend in this field are surveyed.
Abstract: Caricature is a pictorial representation of a person or subject in summarizing way by exaggerating the most distinctive features and simplifies the common features in order to make that subject different from others and at the same time, preserve the likeness of the subject Computer Generated Caricature is developed in order to assist the user in producing caricature automatically or semi-automatically It is derived from the rapid advance in computer graphics and computer vision and introduced as a part of computer graphics’ non-photo realistic rendering technologies as well Recently, Computer Generated Caricature becomes particularly interesting research topic due to the advantageous features of privacy, security, simplification, amusement and their explosive emergent real-world application such as in magazine, digital entertainment, Internet and mobile application On the basis of the previous facts, this paper surveys the uses of caricature in variety of applications, theories and rules in the art of drawing caricature, how these theories are simulated in the development of caricature generation system and the current research trend in this field Computer generated caricature can be divided into two main categories based on their input data type: human centered approach and image processing approach Next, process of generating caricature from input photo is explained briefly It also reported the state of the art techniques in generating caricature by classifying it into four approaches: interactive, regularity-based, learning-based and predefined database of caricature illustration Lastly, this paper will discuss relevant issues, problems and several promising direction of future research

36 citations


Cites background from "Synthetic Biometrics: A Survey"

  • ...Basically, there are two main purposes of study dealing with faces [19], for face recognition that involves analysis tasks and face reconstruction that consist of synthesis tasks....

    [...]

References
More filters
Book
01 Jan 1992
TL;DR: In this article, the Voronoi diagram generalizations of the Voroni diagram algorithm for computing poisson Voroni diagrams are defined and basic properties of the generalization of Voroni's algorithm are discussed.
Abstract: Definitions and basic properties of the Voronoi diagram generalizations of the Voronoi diagram algorithms for computing Voronoi diagrams poisson Voronoi diagrams spatial interpolation models of spatial processes point pattern analysis locational optimization through Voronoi diagrams.

4,018 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Book
14 Apr 2005
TL;DR: The study of spontaneous facial expression in psychology has been conducted by as mentioned in this paper, who found that the asymmetry of facial actions is inconsisten with models of hemispheric specialization and the consistency of facial expressions of pain: a comparison across modalities.
Abstract: Foreword Introduction The study of spontaneous facial expression in psychology I: BASIC RESEARCH ON EMOTION 1. Is the startle reaction an emotion? 2. The asymmetry of facial actions is inconsisten with models of hemispheric specialization 3. Coherence between expressive and experiential systmes in emotion 4. Will the real relationship between facial expression and affective experience please stand up: The case of exhilaration 5. Extraversion, alcohol, and enjoyment 6. Signs of appeasement: Evidence for the distinct displays of embarrassment, amusement, and shame 7. Genuine, suppressed, and faked facial behavior during exacerbation of chronic low back pain 8. The consistency of facial expressions of pain: a comparison across modalities 9. Smiles when lying 10. Behavioral markers and recognizability of the smile of enjoyment 11. Components and recognition of facial expression in the communication of emotion by actors 12. Differentiating emotion elicited and deliberate emotional facial expressions 13. Japanese and American infants' responses to arm restraint 14. Differential facial responses to four basic tests in newborns II: APPLIED RESEARCH 15. Facial expressions in affective disorders 16. Emotional experience and epxression in schizophrenia and depression 17. Interaction regulations used by schizophrenic and psychosomatic patients: Studies on facial behavior in dyadic interactions 18. Nonverbal expression of psychological states in psychiatric patients 19. Depression and suicide faces 20. Prototypical affective microsequences in psychotherapeutic interaction 21. Facial expressions of emotion and psychopathology in adolescent boys 22. Type A behavior pattern: Facial behavior and speech components Conclusion What we have learned by measuring the face Index

1,875 citations

Journal ArticleDOI
TL;DR: The capability of the human visual system with respect to these problems is discussed, and it is meant to serve as an ultimate goal and a guide for determining recommendations for development of an automatic facial expression analyzer.
Abstract: Humans detect and interpret faces and facial expressions in a scene with little or no effort. Still, development of an automated system that accomplishes this task is rather difficult. There are several related problems: detection of an image segment as a face, extraction of the facial expression information, and classification of the expression (e.g., in emotion categories). A system that performs these operations accurately and in real time would form a big step in achieving a human-like interaction between man and machine. The paper surveys the past work in solving these problems. The capability of the human visual system with respect to these problems is discussed, too. It is meant to serve as an ultimate goal and a guide for determining recommendations for development of an automatic facial expression analyzer.

1,872 citations

Journal ArticleDOI
TL;DR: A new approach for recognizing the iris of the human eye is presented, and the resulting one-dimensional signals are compared with model features using different dissimilarity functions.
Abstract: A new approach for recognizing the iris of the human eye is presented. Zero-crossings of the wavelet transform at various resolution levels are calculated over concentric circles on the iris, and the resulting one-dimensional (1-D) signals are compared with model features using different dissimilarity functions.

1,184 citations